Filtern
Erscheinungsjahr
Dokumenttyp
- Konferenzveröffentlichung (194) (entfernen)
Sprache
- Englisch (194) (entfernen)
Volltext vorhanden
- nein (194) (entfernen)
Schlagworte
- Field measurement (2)
- Solar modules (2)
- Air handling unit (1)
- Alternative Geschäftsmodelle (1)
- Assisted living technologies (1)
- Assistive robotics (1)
- Augmented Reality (1)
- Climate change (1)
- Continuous Queries (1)
- Crowdfunding (1)
- Datalog (1)
- Deductive Databases (1)
- Erweiterte Realität <Informatik> (1)
- Future capacity needs (1)
- Human-Robot Interaction (1)
- Human-centered computing (1)
- Hydraulic compression, Carbon Nano Fibers, PEM Fuel Cells, Catalyst utilization (1)
- Incremental Evaluation (1)
- Journalismus (1)
- Kalman filter (1)
- Mixed Reality (1)
- PEM Electrolysis, Hydrogen, Hydraulic Compression, High Pressure (1)
- People with disabilities (1)
- Performance prediction (1)
- Robot assistive drinking (1)
- Robot assistive eating (1)
- Temperature coefficients (1)
- Tetraplegie (1)
- Update Propagation (1)
- Urban heat island (1)
- Zustandsmaschine (1)
- consent banner (1)
- cookie banner (1)
- cookies (1)
- human-centered design (1)
- hybrid sensor system (1)
- participatory design (1)
- privacy (1)
- risk management (1)
- sensor fusion (1)
- state machine (1)
- user acceptance (1)
- web measurement (1)
Institut
- Westfälisches Institut für Gesundheit (49)
- Institut für Internetsicherheit (45)
- Westfälisches Energieinstitut (20)
- Elektrotechnik und angewandte Naturwissenschaften (18)
- Informatik und Kommunikation (16)
- Maschinenbau Bocholt (12)
- Wirtschaft und Informationstechnik Bocholt (7)
- Institut für biologische und chemische Informatik (5)
- Fachbereiche (2)
- Institut Arbeit und Technik (2)
Measurement studies are essential for research and industry alike to understand the Web’s inner workings better and help quantify specific phenomena. Performing such studies is demanding due to the dynamic nature and size of the Web. An experiment’s careful design and setup are complex, and many factors might affect the results. However, while several works have independently observed differences in
the outcome of an experiment (e.g., the number of observed trackers) based on the measurement setup, it is unclear what causes such deviations. This work investigates the reasons for these differences by visiting 1.7M webpages with five different measurement setups. Based on this, we build ‘dependency trees’ for each page and cross-compare the nodes in the trees. The results show that the measured trees differ considerably, that the cause of differences can be attributed to specific nodes, and that even identical measurement setups can produce different results.
Cookie notices (or cookie banners) are a popular mechanism for websites to provide (European) Internet users a tool to choose which cookies the site may set. Banner implementations range from merely providing information that a site uses cookies over offering the choice to accepting or denying all cookies to allowing fine-grained control of cookie usage. Users frequently get annoyed by the banner’s pervasiveness as they interrupt “natural” browsing on the Web. As a remedy, different browser extensions have been developed to automate the interaction with cookie banners.
In this work, we perform a large-scale measurement study comparing the effectiveness of extensions for “cookie banner interaction.” We configured the extensions to express different privacy choices (e.g., accepting all cookies, accepting functional cookies, or rejecting all cookies) to understand their capabilities to execute a user’s preferences. The results show statistically significant differences in which cookies are set, how many of them are set, and which types are set—even for extensions that aim to implement the same cookie choice. Extensions for “cookie banner interaction” can effectively reduce the number of set cookies compared to no interaction with the banners. However, all extensions increase the
tracking requests significantly except when rejecting all cookies.
Steganography, the art of concealing information in different types of medias, is a very old practice. Yet, it only recently started being used by malware operators on a large scale. Malware programmers and operators are increasing their efforts in developing covert communication channels between infected computers and their command and control servers. In addition to steganography, recent examples include hiding communication in inconspicuous network traffic such as DNS queries or HTTP 404 error messages.
When used properly, these covert communication channels can bypass many automated detection mechanisms and render malware communication difficult to detect and block. From an attacker's perspective, covert communication channels are a valuable addition because they allow messages to blend in with legitimate traffic and thus significantly lower the chance of being detected even when inspected by a human analyst.
This presentation studies recent advances in covert communication channels used by real-world malware. First, we will show how steganography has recently been used in three different malware families (Stegoloader, Vawtrak, and Lurk). We will dive into the implementation details on how steganography is implemented and discuss the strengths and weaknesses of each approach. Furthermore, we will detail and compare the usage of inconspicuous carrier protocols for covert communication channels in malware. Examples will span commodity cybercrime as well as targeted attack malware.
The cases that are discussed in this presentation are based on real life incidents. While it is easy to speculate how covert communication channels might be used by malicious actors, documentation of real-world cases is sparse. Yet covert communication channels have arrived in both, the commodity cybercrime and targeted attack world. It is thus vital to understand the status-quo and identify current trends in cybercriminal and targeted attack malware. As such, we believe that it is mandatory to highlight what is currently being used in the wild.
CoCoSpot: Clustering and recognizing botnet command and control channels using traffic analysis
(2017)
Purpose
So far, there are several approaches of measuring the Dark Triad traits, but still all of them are
personality questionnaires with at least questionable usability for applied contexts such as Human
Resource Management.
The purpose of the study is the development of a structured interview with the aim of measuring the Dark Triad in a rather qualitative way that increases social validity for the respondents.
Design/Methodology/Approach/Intervention
In the present study, 15 executives from the telecommunications industry were interviewed on their personal evaluation of management success and derailment. Afterwards, their personality traits of the Dark Triad were measured with the help of the Short Dark Triad Scale. Subsequently, the data from qualitative and quantitative research were examined for correlations using the mixed-method approach.
Results
The results of the mixed-method approach showed a statistically significant correlation between the Short Dark Triad Scale and the ratings for narcissism, Machiavellianism and subclinical psychopathy in the Dark Triad interview.
Limitations
Replicating the results in a bigger sample and a deeper investigation of the criterion-related validity as well as an integration of multiple raters can provide more confidence in our results.
Research/Practical Implications
Structured interviews allow the measurement of personality traits in a more convenient way especially in personnel selection and development processes. Identifying subclinical traits in leadership candidates can, e.g. prevent management derailment.
Originality/Value
The present study advances the measurement methods of the Dark Triad.